Below are the general authentication steps used for UT systems that do not authenticate through the Central Authentication Service (CAS). The steps may vary slightly depending on the application or operating system being used.